【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
CE
解析
暂无解析
相关试题
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
推荐试题
【单选题】
如下图 3 YA 失电、1YA 得电,换向阀 2 和换向阀 1 均位于 位 ___
A. 左
B. 右
C. 中位
D. 不确定
【单选题】
液压油太脏、过滤不良及其它机械杂质侵入造成节流阀 ___
A. 阻塞
B. 流通
C. 顺畅
D. 通畅
【单选题】
机床拆卸前了解机械设备 系统,明确其用途和相互间的作用 ___
A. 传动
B. 连接
C. 包装
D. 固定
【单选题】
机床拆卸时最后按先外后内、先上后下的 ,分别将各部件分解成零件 ___
A. 顺序
B. 位置
C. 部位
D. 宽度
【单选题】
机床组装前应熟悉设备 和技术要求 ___
A. 装配图
B. 三视图
C. 左视图
D. 右视图
【单选题】
机床组装时首先 的安装 ___
A. 床身与床脚
B. 齿条
C. 刀架
D. 电气
【单选题】
简单 PLC 的运算功能包括逻辑运算和 ___
A. 计时和计数功能
B. 编程功能
C. 控制功能
D. 处理速度功能
【单选题】
按故障造成的后果分危害性故障、 ___
A. 安全性故障
B. 磨损性故障
【单选题】
C.先天性故障 D.部分性故障 13116.目前高速主轴多数采用 轴承 ___
A. 陶瓷滚动
B. 角接触球轴承
C. 向心
D. 推力
【单选题】
主轴内刀具的自动夹紧装置松刀时,通过 活塞推动拉杆来压缩碟形弹簧,使夹头涨开 ___
A. 液压缸
B. 液压马达
C. 液压泵
D. 节流阀
【单选题】
在主轴前端设置一个 键,当刀具装入主轴时,刀柄上的键槽必须与突键对准,才 能顺利换刀 ___
A. 突
B. 锲
C. 斜
D. 平
【单选题】
数控机床主轴润滑通常采用 润滑系统 ___
A. 循环式
B. 手工
C. 压力
D. 管路
【单选题】
求 ___
A. 配合
B. 接触
C. 连接
D. 加工
【单选题】
诊断的步骤包括 ___
A. 要确定运行状态检测的内容、建立测试系统,特征提取,制定决策都正确
B. 特征提取
C. 制定决策
D. 要确定运行状态检测的内容、建立测试系统
【单选题】
梯形齿同步带在传递功率时由于应力集中在 部位,使功率传递能力下降 ___
A. 齿根
B. 分度圆
C. 齿顶
D. 齿顶圆
【单选题】
伺服电动机与滚珠丝杠连接不同轴引起滚珠丝杠在 中转矩过大 ___
A. 运转
B. 振动
C. 移动
D. 连接
【单选题】
变挡液压缸窜油或内泄造成 无变速 ___
A. 主轴
B. 升降
C. 进给
D. 工作台
【单选题】
斜齿轮垫片间隙消除的结构可用于 传动齿轮 ___
A. 中间
B. 输入
C. 输出
D. 传动
【单选题】
采用丝杠固定、螺母旋转的传动方式,螺母一边转动、一边沿固定的丝杠作 移动 ___
A. 轴向
B. 周向
C. 径向
D. 反向
【单选题】
二滑板配合压板过紧或研伤会造成滚珠丝杠在运转中 过大 ___
A. 转矩
B. 转动
C. 速度
D. 动量
【单选题】
杠轴向窜动的可能 ___
A. 读数
B. 位置
C. 指针
D. 转动
【单选题】
丝杠窜动引起的故障检查的顺序大致为:伺服驱动装置、电动机及测量器件、电动机与 丝杠连接部分、液压平衡装置、开口螺母和滚珠丝杠、 、其他机械部分 ___
A. 轴承
B. 电气开关
C. 变压器
D. 接触器
【单选题】
导轨研伤机床经长期使用因为地基与床身水平有变化,使导轨 单位面积负荷过大 ___
A. 局部
B. 全部
C. 整体
D. 角落
【单选题】
主轴头通常有卧式和立式两种,常用转塔的 来更换主轴头,以实现自动换刀 ___
A. 转位
B. 升高
C. 移动
D. 旋转
【单选题】
气压太高会造成机械手换刀速度过 ___
A. 快
B. 慢
C. 低
D. 小
【单选题】
数控系统面板上这些按钮 的作用是 ___
A. 快速进给倍率选择
B. 模拟主轴运转倍率选择
C. 空运转速度
D. 单端运行速度
【单选题】
数铣加工过程中,按了紧急停止按钮后,应 ___
A. 手动返回参考点
B. 排除故障后接着走
C. 重新装夹工件
D. 重新上刀
【单选题】
数控系统的手动进给值一般采用 输入 ___
A. 英寸或毫米
B. 毫米
C. 厘米
D. 英寸
【单选题】
通常情况下,数控机床的 DNC 功能是在数控系统的 工作方式下实现的 ___
A. 自动
B. 手轮
C. 录入
D. 手动
【单选题】
对 ISO EOB FMS MDI 的正确解释是 ___
A. 国际标准化组织、程序段结束符、柔性制造系统、手动数据输入
B. 美国工业电子协会、程序结束符、集成制造系统、自动运行
C. 美国工业电子协会、程序段结束符、柔性制造系统、自动运行
D. 国际标准化组织、程序结束符、集成制造系统、手动数据输入
【单选题】
机械原点是 ___
A. 机床坐标系原点
B. 工作坐标系原点
C. 附加坐标系原点
D. 加工程序原点
【单选题】
数控机床的准停功能主要用于 ___
A. 换刀和让刀
B. 退刀
【单选题】
C.换刀和加工中 D.测量工件时 13141.按下数控系统的 按钮,机床开始在程序的控制下加工零件 ___
A. 循环启动
B. 主轴正传
C. 暂停
D. 复位
【单选题】
数控系统在自动运行时,单程序段控制指的是 ___
A. 执行完程序的一个程序段之后停止
B. 程序的所有程序段接连运行
C. 只能执行简单的程序
D. 跳过指定的程序段
【单选题】
数控车床在执行刚性攻丝时, 每旋转一转,沿攻丝轴产生一定的进给(螺纹导程) ___
A. X 轴
B. 进给轴
C. Z 轴
D. 主轴
【单选题】
如果数控系统某个扩展 I/O 模块的 DI、DO、AI、AO 数量全部设为 0,系统认为该站号 ___
A. 有效
B. 只有在机床空载时有效
C. 无效
D. 只有在机床空载时无效
【单选题】
当数控系统的软限位参数设定为 0 时,软限位机能 ___
A. 失效
B. 有效
C. 最大
D. 最小
【单选题】
关于无挡块式回参考点的数控机床,参考点的设定,正确的是 ___
A. 返回参考点前先选择返回参考点的方式
B. 用自动把轴移动到参考点附近
C. 用快速定位指令将轴移动到下一个栅格位置后停止
D. 返回参考点后要关机
【单选题】
当数控系统切削进给指数加减速时间常数为 0 时,指数加减速机能 ___
A. 无效
B. 有效
C. 最小
D. 最大
【单选题】
如果用刀具的侧刃加工,为了工件尺寸准确,就必须要在数控系统里设定 参数 ___
A. 刀具半径补偿
B. 刀具金属性能
C. 刀具长度补偿
D. 刀具切削速度 13150.数控机床不同螺距的丝杠与各种步距角的电机相配时,通过 设定,可以使编程与